Sciweavers

6574 search results - page 99 / 1315
» Current Signatures: Application
Sort
View
NDSS
2006
IEEE
15 years 6 months ago
Using Generalization and Characterization Techniques in the Anomaly-based Detection of Web Attacks
The custom, ad hoc nature of web applications makes learning-based anomaly detection systems a suitable approach to provide early warning about the exploitation of novel vulnerabi...
William K. Robertson, Giovanni Vigna, Christopher ...
SMI
2005
IEEE
15 years 6 months ago
Curvature Maps for Local Shape Comparison
— The ability to identify similarities between shapes is important for applications such as medical diagnosis, object registration and alignment, and shape retrieval. In this pap...
Timothy Gatzke, Cindy Grimm, Michael Garland, Stev...
84
Voted
ICALP
2005
Springer
15 years 6 months ago
Completely Non-malleable Schemes
Abstract An encryption scheme is non-malleable if the adversary cannot transform a ciphertext into one of a related message under the given public key. Although providing a very st...
Marc Fischlin
112
Voted
CORIA
2004
15 years 2 months ago
Audiovisual production invariant searching
Information searching in non-textual media is a fundamental point of interest, especially in the audiovisual industry where there is still an important need of tools for manipulati...
Siba Haidar, Philippe Joly, Bilal Chebaro
101
Voted
ISSA
2004
15 years 2 months ago
Security Considerations In A Global Message Service Handler Design
: Web services are generally accepted as the most interoperable application interface today on the Web. In the context of a global electronic marketplace this is an essential facto...
Johannes J. van Eeden